Results 61 to 70 of about 518,478 (263)

Face and Fingerprint Fusion System for Identity Authentication Using Fusion Classifiers

open access: yesInternational Journal of Computer Science & Engineering Survey, 2018
In this work, we propose a feature level fusion and decision level fusion of face and fingerprint for designing a multimodal biometric system. Initially, Gabor and Scale Invariant Feature Transform features are extracted for both offline face and fingerprint of a person and studied the identification accuracy.
Somashekhar B M, Nijagunarya Y.S
openaire   +2 more sources

Fusion Operators in the Generalized $\tau^{(2)}$-model and Root-of-unity Symmetry of the XXZ Spin Chain of Higher Spin

open access: yes, 2007
We construct the fusion operators in the generalized $\tau^{(2)}$-model using the fused $L$-operators, and verify the fusion relations with the truncation identity. The algebraic Bethe ansatz discussion is conducted on two special classes of $\tau^{(2)}$
Albertini G   +25 more
core   +2 more sources

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

An Extension of the Character Ring of sl(3) and Its Quantisation

open access: yes, 1998
We construct a commutative ring with identity which extends the ring of characters of finite dimensional representations of sl(3). It is generated by characters with values in the group ring $Z[\tilde{W}]$ of the extended affine Weyl group of $\hat{sl}(3)
Furlan, P.   +2 more
core   +2 more sources

Exactly Solvable Lattice Models with Crossing Symmetry [PDF]

open access: yes, 2012
We show how to compute the exact partition function for lattice statistical-mechanical models whose Boltzmann weights obey a special "crossing" symmetry.
Fendley, Paul, Simon, Steven H.
core   +1 more source

Football, fan violence, and identity fusion [PDF]

open access: yesInternational Review for the Sociology of Sport, 2017
Football violence has been a global problem for decades. A new way to approach the phenomenon comes from the theory of identity fusion, an extreme form of social bonding implicated in personally costly pro-group behaviours. Using British and Brazilian fan cultures to illustrate, this article discusses the ways in which identity fusion can help ...
openaire   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2011
The recent years have seen a rise in the number of cases of cyber-crime committed through identity theft and fraud. To address this problem, this paper uses adaptive neural-fuzzy inference system, fuzzy logic and artificial neural network to implement a ...
Jackson Phiri   +3 more
doaj   +1 more source

Audio–Visual Fusion Based on Interactive Attention for Person Verification

open access: yesSensors, 2023
With the rapid development of multimedia technology, personnel verification systems have become increasingly important in the security field and identity verification.
Xuebin Jing   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy